What Is Enterprise-wide Intrusion Prevention? Why Do I Need It?
Continued innovation has created many ways to protect against known threats. We evaluate every new attack that hits, spending valuable time analyzing and creating defenses that protect against major worms, viruses, commonly-known hacking vulnerabilities and other threats. Yet a malicious attacker can change only a few lines of code and the same worm, or Trojan will slip right by the reactive signature or patches developed to stop the original. Hackers creatively find new ways to breach traditional signature-based security defenses. Ongoing changes and upgrades in network infrastructures, Web services, and new software continue to create vulnerabilities and opportunities for exploitation. Perimeter-focused security, which blocks attacks coming from outside, is no longer enough. IT staff really need to understand what constitutes normal network behavior, identify inconsistent behavior, and fix it so business can proceed. Enterprise-wide intrusion prevention profiles network behavior acro